Post
Topic
Board Development & Technical Discussion
Re: How does getting the private key and nonce from a nonce reuse work?
by
fairmuffin
on 04/04/2025, 14:05:25 UTC
I suppose you're referring to this: https://allprivatekeys.com/random-vulnerability. Well, they explain the process there in detail.
The address you mention is listed there.
Yes but it didn't make sense to me a lot, since the example they gave was, for one transaction which had the same public key do the repeat.

Ok, summarizing for future reference, the possible vulnerabilities are:


1- A public key generates two signatures using the same nonce.

2- A public key generates a signature reusing a vulnerable nonce, as in case 1 (knowing the value of k  allows the derivation of the private key from all signatures that use it).

3- Signatures with vulnerable nonces that have low entropy (few bits).

4- Signatures where the differences between nonces are minimal.

5- Signatures generated with a predictable randomness system, such as Mersenne Twister.

That sums it up, yes. But how would you know that a signature has a vulnerable nonce with low entropy?